CVE-2024-49771

Source
https://cve.org/CVERecord?id=CVE-2024-49771
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49771.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-49771
Aliases
Published
2024-10-28T16:57:43.271Z
Modified
2026-03-14T12:39:17.036330Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
MPXJ has a Potential Path Traversal Vulnerability
Details

MPXJ is an open source library to read and write project plans from a variety of file formats and databases. The patch for the historical vulnerability CVE-2020-35460 in MPXJ is incomplete as there is still a possibility that a malicious path could be constructed which would not be picked up by the original fix and allow files to be written to arbitrary locations. The issue is addressed in MPXJ version 13.5.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49771.json"
}
References

Affected packages

Git / github.com/joniles/mpxj

Affected ranges

Type
GIT
Repo
https://github.com/joniles/mpxj
Events

Affected versions

v10.*
v10.0.0
v10.0.1
v10.0.2
v10.0.3
v10.0.4
v10.0.5
v10.1.0
v10.10.0
v10.11.0
v10.12.0
v10.13.0
v10.14.0
v10.14.1
v10.15.0
v10.16.0
v10.16.1
v10.16.2
v10.2.0
v10.3.0
v10.4.0
v10.5.0
v10.6.0
v10.6.1
v10.6.2
v10.7.0
v10.8.0
v10.9.0
v10.9.1
v11.*
v11.0.0
v11.1.0
v11.2.0
v11.3.0
v11.3.1
v11.3.2
v11.4.0
v11.5.0
v11.5.1
v11.5.2
v11.5.3
v11.5.4
v12.*
v12.0.0
v12.0.1
v12.0.2
v12.1.0
v12.1.1
v12.1.2
v12.1.3
v12.10.0
v12.10.1
v12.10.2
v12.10.3
v12.2.0
v12.3.0
v12.4.0
v12.5.0
v12.6.0
v12.7.0
v12.8.0
v12.8.1
v12.9.0
v12.9.1
v12.9.2
v12.9.3
v13.*
v13.0.0
v13.0.1
v13.0.2
v13.1.0
v13.2.0
v13.2.1
v13.3.0
v13.3.1
v13.4.0
v13.4.1
v13.4.2
v13.5.0
v8.*
v8.3.5
v8.4.0
v8.5.0
v8.5.1
v9.*
v9.0.0
v9.1.0
v9.2.0
v9.2.1
v9.2.2
v9.2.3
v9.2.4
v9.2.5
v9.2.6
v9.3.0
v9.3.1
v9.4.0
v9.5.0
v9.5.1
v9.5.2
v9.6.0
v9.7.0
v9.8.0
v9.8.1
v9.8.2
v9.8.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49771.json"